Search

Advanced Search
Screen Reader users press Enter to Limit by product.  Limit by product
Screen Reader users press Enter to Limit by category.  Limit by category
Search Tips
Search filters applied
Category Remove
Home Email Spam

Search Results

Other Suggested Searches
Did you mean:
No results found.

Suggestions:
  • Make sure all words are spelled correctly
  • Use different words that mean the same thing
Results 1 - 10 of 24
Recommended Links
  1. Received an email but not sure if it's really from BT? Read more about "phishing" emails
    If you receive an email that appears to have been sent by BT with the either of following subject fields:   IMPORTANT: Alert about your BT Internet billing information on file or British...
    Date Updated: 18/05/2009
  2. 22/07/09: BT and Vodafone Agreement
    Consumers and small businesses in Ireland will benefit from greater competition and choice, following a strategic partnership agreed between BT and Vodafone.  The landmark contract will...
    Date Updated: 22/07/2009
  3. Q&A's regarding the BT and Vodafone Agreement
      Click here to read the full statement about the agreement between Vodafone and BT   What BT customers will transfer to Vodafone as part of this agreement?   This agreement involves...
    Date Updated: 22/10/2009
  4. What is phishing and how can I stay protected online? Part 1
    What is phishing? Phishing is an illegal activity that occurs when online criminals (phishers) pretend to be legitimate organisations, like banks and credit card companies, in order to trick you into...
    Date Updated: 23/04/2008
  5. Protecting your computer against Viruses & Worms
    Computer Viruses A computer virus is merely a program that attaches itself to another program or data file in order to spread and reproduce itself without the knowledge of the user.   The effects of...
    Date Updated: 23/04/2008
  6. Knowing When to Trust an Email
    Email is a great way to keep in touch with other people. Unfortunately, it can also open your computer to security risks, computer viruses, and potentially malicious software if you're not careful...
    Date Updated: 23/04/2008
  7. What methods do spammers use?
    Receiving mail addressed to someone else . Although it may seem messages are being indirectly sent to you, in reality you are a victim of spam. What some spammers do is send a bulk mail to a false or...
    Date Updated: 12/02/2008
  8. Spyware, Adware and Malware
    Spyware (also known as adware and malware) can install on your computer using a variety of methods, for instance if you view a web page that has malicious code, or through a virus which has infected...
    Date Updated: 23/04/2008
  9. Think Before You Click: The Top Five Internet Scams
    Internet scams are by no means a recent phenomenon, but certain scams come back again and again. Here are five popular Internet scams that you should be on the lookout for.  1. Auction fraud...
    Date Updated: 04/02/2009
  10. Warning! Fraudulent Email Alert for Oceanfree Users
    Delete the Email and do NOT respond!   If you recently received emails similar to the those printed below you should delete it without responding or clicking on any website link. If you are...
    Date Updated: 15/10/2009